Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #739006
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2023-03-27
Last occurrence
2023-04-11
Unique reports
2
Quality
-44

Statistics

Operating system Unique / Total count
Fedora 37 2 / 4
Operating system Count
Fedora 37 4
Architecture Count
x86_64 4

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
? __pfx_VNetUserListenerEventHandler
vmnet 0x10
2
__pfx_VNetUserListenerEventHandler
vmnet 0x10
3
__pfx_VNetUserListenerEventHandler
vmnet 0x10
4
__pfx_VNetUserListenerEventHandler
vmnet 0x10
5
? do_futex
vmlinux 0xda
6
do_futex
vmlinux 0xda
7
do_futex
vmlinux 0xda
8
? do_futex
vmlinux 0xda
9
? do_futex
vmlinux 0xda
10
? do_futex
vmlinux 0xda
11
? do_futex
vmlinux 0xda
12
? do_futex
vmlinux 0xda
13
? do_futex
vmlinux 0xda
14
? do_futex
vmlinux 0xda
15
? do_futex
vmlinux 0xda
16
do_futex
vmlinux 0xda
WARNING: CPU: 0 PID: 60419 at /tmp/modconfig-uyiulB/vmnet-only/vnetUserListener.c:229 VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Modules linked in: tls snd_seq_dummy snd_hrtimer vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) qrtr vmnet(OE) ppdev parport_pc parport vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) sunrpc binfmt_misc vfat pktcdvd fat squashfs uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc rt2800pci rt2800mmio rt2800lib rt2x00pci intel_rapl_msr rt2x00mmio rt2x00lib intel_rapl_common x86_pkg_temp_thermal intel_powerclamp mac80211 coretemp at24 kvm_intel iTCO_wdt mei_pxp mei_hdcp mei_wdt intel_pmc_bxt kvm iTCO_vendor_support snd_hda_codec_idt snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio libarc4 snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi irqbypass snd_hda_codec cfg80211 snd_hda_core hp_wmi rapl intel_cstate i2c_i801 sparse_keymap wmi_bmof platform_profile snd_hwdep joydev intel_uncore mei_me snd_seq i2c_smbus pcspkr mei snd_seq_device eeprom_93cx6 lpc_ich rfkill snd_pcm snd_timer snd hp_accel lis3lv02d wireless_hotkey soundcore loop zram
 i915 rtsx_pci_sdmmc mmc_core crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic drm_buddy drm_display_helper ghash_clmulni_intel r8169 cec sha512_ssse3 serio_raw rtsx_pci ttm video wmi uas usb_storage ip6_tables ip_tables fuse
CPU: 0 PID: 60419 Comm: vmx-vcpu-0 Tainted: G           OE      6.2.7-200.fc37.x86_64 #1
Hardware name: Hewlett-Packard HP 350 G1/21B7, BIOS F.11 01/16/2014
RIP: 0010:VNetUserListenerEventHandler+0xd3/0xf0 [vmnet]
Code: 3d 33 78 00 00 00 75 93 b9 14 00 00 00 48 c7 c2 b0 26 29 c1 4c 89 ee 48 c7 c7 00 27 29 c1 c6 05 14 78 00 00 01 e8 9d bf e7 e4 <0f> 0b e9 6a ff ff ff 5b 48 c7 c7 80 26 29 c1 5d 41 5c 41 5d 41 5e
RSP: 0018:ffffb48446573bf8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff933f53181a00 RCX: 0000000000000000
RDX: 0000000000000003 RSI: ffffffffa78c1316 RDI: 00000000ffffffff
RBP: ffff933f104be640 R08: 0000000000000000 R09: ffffb48446573a88
R10: 0000000000000003 R11: ffffffffa81447c8 R12: ffff933ef821d988
R13: 000000000000001c R14: ffff933f104be648 R15: ffff933ef821d980
FS:  00007fa86bfff6c0(0000) GS:ffff934112200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005630c5aec730 CR3: 0000000286090001 CR4: 00000000001706f0
Call Trace:
 <TASK>
 ? __pfx_VNetUserListenerEventHandler+0x10/0x10 [vmnet]
 VNetEvent_CreateListener+0xaf/0x100 [vmnet]
 VNetUserListener_Create+0x160/0x10f0 [vmnet]
 VNetFileOpUnlockedIoctl+0x4e8/0x790 [vmnet]
 ? ioctl_has_perm.constprop.0.isra.0+0xdd/0x140
 __x64_sys_ioctl+0x90/0xd0
 do_syscall_64+0x5b/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? do_syscall_64+0x67/0x80
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fa993843d6f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
RSP: 002b:00007fa86bffb530 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fa854001290 RCX: 00007fa993843d6f
RDX: 00007fa86bffb598 RSI: 00000000400899e2 RDI: 00000000000000bc
RBP: 0000000000000001 R08: 00007fa8540012a8 R09: 00007fa86bffc160
R10: 00007fa85400d780 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fa86bffb600 R14: 00000000004c4b40 R15: 00000000000186a0
 </TASK>